Brahma - Privilege elevation exploit for Nintendo 3DS
-
Updated
May 12, 2016 - C
Brahma - Privilege elevation exploit for Nintendo 3DS
SafetyKatz is a combination of slightly modified version of @gentilkiwi's Mimikatz project and @subTee's .NET PE Loader
Linux Privilege Escalation Tool By WazeHell
Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069
AppXSVC Service race condition - privilege escalation
Copy & paste from original code for support ALL Windows Versions
My write-ups for UIUCTF 2020
A bash script exploit of [CVE-2020-16126/CVE-2020-16127] to achieve privilege escalation.Ubuntu 16.04-20.04 LTS本地提权漏洞利用脚本。要求拥有Gnome图形化环境。
x64 Windows privilege elevation using anycall
Bypass UAC by abusing the Internet Explorer Add-on installer
Bypass UAC by abusing the Security Center CPL and hijacking a shell protocol handler
Bypass UAC by abusing the Windows Defender Firewall Control Panel, environment variables, and shell protocol handlers
Bypass UAC at any level by abusing the Task Scheduler and environment variables
Bypass UAC by abusing shell protocol handlers
Bypass UAC at any level by abusing the Program Compatibility Assistant with RPC, WDI, and more Windows components
Shark - An Awesome Linum Enum Suite
Bypass UAC by hijacking a DLL located in the Native Image Cache
Introduction to information security, exploiting a vulnerable ISO.
Information security challenge, taking advantage of a vulnerable ISO and its systems to become root.
A quick and dirty PoC in C++ to elevate from Admin to SYSTEM.
Add a description, image, and links to the privilege-escalation-exploits topic page so that developers can more easily learn about it.
To associate your repository with the privilege-escalation-exploits topic, visit your repo's landing page and select "manage topics."